首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2篇
  免费   2篇
综合类   1篇
物理学   3篇
  2018年   1篇
  2016年   1篇
  2014年   1篇
  2007年   1篇
排序方式: 共有4条查询结果,搜索用时 62 毫秒
1
1.
Recently, an experimentally feasible three-party quantum sealed-bid auction protocol based on EPR pairs [Z.Y. Wang, Commun. Theor. Phys. 54 (2010) 997] was proposed. However, this study points out Wang's protocol cannot resist some internal bidders' attacks, such as the Twiee-CNOT attack, the collusion attack. A malicious bidder can launch the Twice-CNOT attack to obtain the other's bid, or the dishonest auctioneer may collude with one bidder and help him/her win the action by changing his/her bid. For preventing against these attacks, a simple solution by using the QKD-based message encryption and a post-confirmation mechanism by adopting the hash function are proposed.  相似文献   
2.
As one of essential multimedia in quantum networks, the copyright protection of quantum audio has gradually become an important issue in the domain of quantum information hiding in the decades. In this paper, an improved quantum watermarking algorithm based on quantum audio by using least significant qubit(LSQb) modification is proposed. Compared with the previous achievements, it can effectively improve the robustness and security of watermark for copyright protection of quantum audio. In the new algorithm, the least significant bites and the peripheral least significant bits of the amplitudes are modified in terms of their logical consistency and correlation to enhance watermark robustness of resisting various illegal attacks. Furthermore, the new algorithm can avoid the weak robustness defect of many previous algorithms that directly embedded the watermark into the least significant bits. In order to implement the new algorithm, some specific quantum circuits are designed to obtain better applicability and scalability for embedding and extracting watermark.Finally, the simulation results including the values of audio waveforms and signal to noise ratios(SNR) prove that the new algorithm has good transparency, robustness, and security.  相似文献   
3.
一种稳健的可恢复双重数字水印技术   总被引:2,自引:0,他引:2  
采用自恢复技术和虚拟水印技术等新的技术方法对传统双重数字水印技术的性能进行加强和改进,有效地提高了水印技术的各项性能.文中的自恢复技术利用了双重数字水印所特有的属性,在双重水印中建立函数关系,将两个水印结合在一起,可以在水印受到攻击后对其进行恢复,这很大程度上提高了水印技术的稳健性.虚拟水印是可以在实际只嵌入一重水印的信息量的前提下,实现传统的双重水印技术,改善双重水印技术的不可见性.实验结果表明这一算法对JPEG压缩、添噪、滤波以及多种几何攻击都有很好的稳健性,自恢复实验结果则显示该算法可比同类算法的整体稳健性提高20%.  相似文献   
4.
陈维林  马松雅  瞿治国 《中国物理 B》2016,25(10):100304-100304
Two schemes are proposed to realize the controlled remote preparation of an arbitrary four-qubit cluster-type state via a partially entangled channel. We construct ingenious measurement bases at the sender's and the controller's locations, which play a decisive role in the proposed schemes. The success probabilities can reach 50% and 100%, respectively. Compared with the previous proposals, the success probabilities are independent of the coefficients of the entangled channel.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号